You are here

Privacy & Security

Researchers are developing platforms to securely and quickly send data to and from smartphones. A new mobile application developed to assist providers in meeting patient privacy regulation allows for the sharing and storing of patient-related photos, videos and audio.

The lack of cybersecurity in mobile applications meant to assist dementia patients and their caregivers could put patients' personal health information at risk, according to researchers at McLean Hospitals in Belmont, Massachusetts, and clinicians at Harvard Medical School. A study in the American Journal of Geriatric Psychiatryexamined app security policies and provided recommendations.

Cyberattacks occur on many types of devices—including 3D printers. A new study, conducted by researchers at Rutgers University-New Brunswick and Georgia Institute of Technology, examines methods in protecting 3D printers for improved cybersecurity.

Facing an increasing amount of cyberattacks, healthcare organizations are building up their cybersecurity programs, according to the 2017 HIMSS Cybersecurity Survey. After speaking with 126 health information technology leaders, researchers outlined current security measures to show points of improvement and explore how the industry can prevent future attacks.

The healthcare industry has fought an uphill battle against hackers in 2017—and it shows in the latest Beazley Breach Insights report. The report, conducted by the cyber and data breach response insurance firm, found the rate of ransomware attacks had increased by 50 percent in the first quarter of 2017, with demands up 133 percent.

Researchers are developing platforms to securely and quickly send data to and from smartphones. A new mobile application developed to assist providers in meeting patient privacy regulation allows for the sharing and storing of patient-related photos, videos and audio.

The lack of cybersecurity in mobile applications meant to assist dementia patients and their caregivers could put patients' personal health information at risk, according to researchers at McLean Hospitals in Belmont, Massachusetts, and clinicians at Harvard Medical School. A study in the American Journal of Geriatric Psychiatryexamined app security policies and provided recommendations.

Cyberattacks occur on many types of devices—including 3D printers. A new study, conducted by researchers at Rutgers University-New Brunswick and Georgia Institute of Technology, examines methods in protecting 3D printers for improved cybersecurity.

A recent study form the University of Washington found that security measures on patient's genetic tests are poorly maintained. The unprotected DNA information poses an additional threat because it can be encrypted with malicious code and harm the computer.

Facing an increasing amount of cyberattacks, healthcare organizations are building up their cybersecurity programs, according to the 2017 HIMSS Cybersecurity Survey. After speaking with 126 health information technology leaders, researchers outlined current security measures to show points of improvement and explore how the industry can prevent future attacks.

The healthcare industry has fought an uphill battle against hackers in 2017—and it shows in the latest Beazley Breach Insights report. The report, conducted by the cyber and data breach response insurance firm, found the rate of ransomware attacks had increased by 50 percent in the first quarter of 2017, with demands up 133 percent.

Cyber security is at the top of the list for improvement in many healthcare organizations due to the uptake ransomware attacks in the recent month. The recently published 2017 KPMG/Forbes Insights CyberSecurity Survey outlines on the current landscape of cyber security, technology and strategies in ensuring patient data remains safe while also showcasing where the industry lacks in protecting electronic information.

The HHS Office for Civil Rights (OCR) has introduced a revised HIPAA Breach Reporting Tool (HBRT) that gives individuals information to improve identification of data breaches and help them understand how they are investigated and resolved.